On 04-02-14 17:28, Jaime Fuentes - Ditecal wrote:
> This is my /etc/default/saslauthd
>
> START=yes
> DESC="SASL Authentication Daemon"
> NAME="saslauthd"
> MECHANISMS="pam"
> MECH_OPTIONS=""
> THREADS=5
> OPTIONS="-c -m /var/run/saslauthd"
Using MECHANISM="pam" means that SASL will try to authenticate against
the PAM services, which is very definitely *not* what you want.
Use:
MECHANISMS="rimap"
MECH_OPTIONS="127.0.0.1:143"
OPTIONS="-c"
> if necessary, tamibén I paste my smtpd.conf
>
> pwcheck_method: auxprop
> auxprop_plugin: sql
> sql_engine: mysql
> mech_list: PLAIN LOGIN
> sql_hostnames: localhost
> sql_user: dbmail
> sql_passwd: QAwsED123
> sql_database: dbmail
> sql_verbose: yes
> sql_select: SELECT passwd FROM dbmail_users WHERE userid = '%u@%r'
So *this* means you store your passwords in cleartext in the database,
which may, or may not be true.
Try:
> cat /etc/postfix/sasl/smtpd.conf
mech_list: PLAIN LOGIN ANONYMOUS
pwcheck_method: saslauthd
so sasl will know to use saslauthd. And with the example I show above,
saslauthd will verify by making a IMAP connection. Modify the
MECH_OPTIONS to match your imap server address.
--
________________________________________________________________
Paul J Stevens pjstevns @ gmail, twitter, github, linkedin
* Premium Hosting Services and Web Application Consultancy *
www.nfg.nl/[email protected]/+31.85.877.99.97
________________________________________________________________
_______________________________________________
DBmail mailing list
[email protected]
http://mailman.fastxs.nl/cgi-bin/mailman/listinfo/dbmail